"A honeypot is an information system resource who's value lies in unauthorized or illicit use of that resource."

This page is updated (check the update date at the end) every week after each session.

Course Description

The subject of this course is to use the Honeynet/pot technologies as a tool to discover and learn existing and new threats to networked/distributed information system. The course includes a project to build a custom honeypot to turn the theory into a practical collection engine. The course requires a high involvement from the participants.

Given by : Alexandre Dulaunoy

Project

During the period of the course, there will be a specific project to realize. The project is fully integrated into the course sessions that means some topics covered will help to enhance or complete your work.

Project definition and group composition (2 or 3 max) should be sent before end of January 2010. Project will be registered at gitorious.org and released under a free software license. Project needs to be tagged in gitorious as dess-20092010. The project must be completed for 29th of April 2010.

Scope of the project can be one of the following topic (some topics could overlap) :

Designing and implementing a honeypot system (e.g. on a specific protocol, Web services or even client honeypot).

Sessions - Additional Support

Caveat

You may find that the subject is too experimental and not yet mature for real-life application. If you have any issue with the course (including the way I teach it), don't hesitate to talk about as soon as possible.